Beruflich Dokumente
Kultur Dokumente
William Stallings ~
Web Site for Computer Networking with Internet Protocols and Technology vi
Preface xi
f/
'I
APPENDICES 605
Appendix A RFCs Cited in This Book 605
Appendix B Projects for Teaching Computer Networks 608
B.l Sockets Programming Projects 608
B.2 Simulation Projects 609
B.3 Performance Modeling 609
BA Research Projects 610
B.5 Reading/ReportAssignments 610
Glossary 611
Acronyms 617
References 619
Index 627
i!
INDEX
A RSA, 568-571 Identifier (VCI) field, 454
Secure Hash Algorithm (SHA-l), Virtual Path, 451-454
ABORT primitive, 231 564-565,568 characteristics, 452-453
About RTP (Web site), 379 Allow field, 127 control signaling, 453-454
Accept field, 124 America Online, 28-29 Identifier (VPI) field, 454
Acceptable use policies, 27 ANcount field, 130 AT&T Center for Internet
Accept-Encoding field, 124 Andreasson, Mark, 31 Research, 267
Accept-Language field, 124 Anon-FTP value, Content-type ATM, See Asynchronous transfer
Accounting management, 589 field, 106 mode (ATM)
Antireplay window, and security ATM Forum, 468
user requirements, 589
association, 579 ATM Hot Links, 468
ACK method, SIP, 143
Anycast, 297 AtomicAggregate, Aggregator
Acknowledged connectionless service,
Applicability statement (AS), 9 attribute, Path Attributes field,
logical link control (LLC),
Application layer, 42 422-423
515-516
Application type, MIME, 106-107 Attacks:
Acknowledgment frame, 478
Application/octet-stream subtype, active, 549-550
Acknowledgment Number field, TCP
MIME, 106-107 brute-force, 551-5521
header, 229
ApplicationiPostscript subtype, denial of service, 550
ACM Special Interest Group on masquerade, 549
MIME, 107
Communications
ARcount field, 130 modification of messages, 550
(SIGCOMM), 6
Area field, OSPF packets, 412 passive, 549
Active attacks, 549-550 replay, 549
.arpa,130
denial of service, 550 ARPANET, 24-26, 29, 54, 78-79 AndioNideo Transport Working
masquerade, 549 ASCII, 71 Group, 379
modification of messages, 550 ASPath attribute, Path Attributes field, Authentication Data field:
replay, 549 422-423 Authentication header, 580
Active threats, 547 Assured forwarding (AF) PHB, ESP packet, 581
Adaptive routing, 22, 387-390 335-336 OSPF packets, 413
Address Family field, RIP packet, 404 Asynchronous balanced mode Authentication header, IPv6, 292
Address mask reply message, 290 (ABM), 487 Authentication Type field, OSPF
Address mask request message, 290 Asynchronous response mode packets, 413
Addresses, 284-287 (ARM), 488 Authenticator, 568
network classes, 284-285 Asynchronous transfer mode (ATM), Authenticity, 549
subnets/subnet masks, 285-287 14,15,23,31,167,447,451-460 Authoritative Answer field, 135
Addressing, 280-281 cells, 454-457 Authorization field, 124
level, 280 cell loss priority (CLP), 456 Automatic repeat request (ARQ),
modes, 281 Generic Flow Control (GFC), 482-487
reliable sequencing network service, 456-457 Autonomous system (AS),
204-206 Generic Flow Control (GFC) 390-392,436
schemes, and routers, 63 field, 454 Aux Data Length field, group
scope, 281 Header Error Control (HEC) record, 433
Admission control, 309 field, 456 Auxiliary Data field, group record, 433
Adobe Pagemill, 32 logical connections in, 452 Available Bit Rate (ABR) service, 460
ADSL,29 meta-signaling channel, 453 Availability, 549
Advance Research Projects Agency Payload Type (PT) .field, 454-456
(ARPA),24 semipermanent virtual channels, 453
Advanced Encryption Standard service categories, 457-460 B
(ABS),552-555 Available Bit Rate (ABR) service,
.aero,130 460 Backoff, 253,519
AFS value, Content-type field, 106 Constant Bit Rate (CBR) service, binary exponential, 253, 519
AH information, and security 458-459 exponential RTO, 253
association, 579 Guaranteed Frame Rate (GFR) Backpressure,184-185
Algorithms: service, 460 Backward explicit congestion
Bellman-Ford,396-398 Non-Real-Time Service, 458, notification (BECN), 269
constraint-based routing, 367 459-460 Barber, Theodore, 115,419
decryption, 551,566 Non-Real-Time Variable Bit Rate Base station, 461,465
Dijkstra's, 394-396 (nrt-VBR), 459 Base64 transfer encoding, 108
distributed Bellman-Ford, 400-402 Real-Time Service, 458-459 Basic e-mail operation, SMTP, 95-97
encryption, 550,552-555,566 Real-Time Variable Bit Rate Batch retransmission strategy, 233
general-purpose, 566-568 (rt-VBR),459 Bellman-Ford algorithm, 396-398
Jacobson's, 250-253 Unspecified Bit Rate (UBR), Berners-Lee, Tim, 27-28
Karn's, 253-254 459-460 Best Current Practice (BCP), 9
least-cost, 393-399 Virtual Channel, 451-454 Best-effort service, 167,459
RED, 323-327 characteristics 452-453 BGP, See Border Gateway Protocol
routing, 309 control signaling 453-454 (BGP)
627
628 INDEX
INDEX 633
INDEX 635
Logical link control (LLC), 190, Message header error, Border Gateway Number of Sources field, 433
514-516 Protocol (BGP), 423 operation, 434
acknowledged connectionless Message type, MIME, 105 QQIC (querier's querier interval
service, 515-516 Messages: code) field, 433
connection-mode service, 515-516 Border Gateway Protocol (BGP), QRV (querier's robustness
defined, 514 421-423 variable) field, 433
services, 514-515 Domain Name System (DNS), S Flag field, 433
unacknowledged connectionless 135-137 Source Addresses field, 433
service, 514-516 Meta-signaling channel, 453 Type field, 431
Logical link control (LLC) layer, 64 Meter element, traffic conditioning multicast addresses, 425
London Internet Exchange (LINX), 27 function, 333 multicast extensions to Open
Lost frame, 482 Metric field, RIP packet, 404 Shortest Path First (MOSPF),
LSP, See Label switched path (LSP) Metropolitan area networks (MANs), 435-438
LSRs, See Label switched routers 24,533 equal-cost multipath ambiguities,
(LSRs) Microcells, 464 435
.mil,130 interarea multicast forwarders, 436
MIME, See Multi-purpose Internet interarea multicasting, 435-436
M Mail Extension (MIME) inter-AS multicast forwarders, 437
MIME-Version field, 123 inter-AS multicasting, 436-438
M Flag field, fragment header, 299 Minimize Delay metric, 411 wildcard multicast receiver, 436
MAC, See Medium access control Minimize Monetary Cost metric, 410 multiple unicast stra,tegy, 426
(MAC) Minor Version field, SSL Record Protocol Independent Multicast
MAC Control field, MAC frames, 516 Protocol header, 574 (PIM), 438-441
MAC frame, 520-521 MIS, 165 sparse-mode PIM, 439-441
Macrocells, 464 Mobile telecommunications switching strategy, 438-439
MAE East/MAE West, 27 office (MTSO), 465 requirements for, 429-430
MAIL command, SMTp, 100 Mobile unit initialization, 466-467 strategy, 427-428
Mail transfer, SMTP, 100-101 Mobile-originated call, 467 traffic generated by strategies, 428
Mail-server value, Content-type Modulo 2 arithmetic, 499-502 transmission example, 428
field, 106 Mosaic, 31 MultiExitDisc attribute, Path
Major Version field, SSL Record MOSPF, See Multicast Extensions to Attributes field, 422
Protocol header, 574 Open Shortest Path First Multimedia, and multicasting, 426
Management: (MOSPF) Multipart type, MIME, 103-104
accounting, 589 MOSPF Working Group, 441 Multipart/alternative subtype,
user requirements, 589 MOVE request method, 124 MIME, 105
configuration and name, 590 MPLS, See Multiprotocollabel Multipartldigest subtype,MIME, 105
user requirements, 590 switching (MPLS) Multipart/mixed subtype, MIME, 105
key, 571-572 MPLS Forum, 379 Multipart/parallel sUbtype, MIME, 105
retransmission timer, 250-254 MPLS Resource Center, 379 Multiple unicast strategy, 426
exponential RTO backoff, 253 MPLS Working Group, 379 Multiplexing, 221-222
Jacobson's algorithm, 250-253 MTSO, See Mobile example of, 223
Karn's algorithm, 253-254 telecommunications switching reliable sequencing network
RTT variance estimation, 250-253 office (MTSO) service, 206
window, 254-263 Multicast, 281, 297 Multiprotocollabel switching (MPLS),
Management agent, 311 Multicast Address field, group record, 433 345,357-368
Management information systems Multicast Extensions to Open Shortest background, 357-359
(MIS),165 Path First (MOSPF), 419, . connection-oriented QoS
MANs, See Metropolitan area 435-438 support, 358
networks (MANs) equal-cost multipath ambiguities, 435 rilUltiprotocol support, 359
Marker element, traffic conditioning interarea multicast forwarders, 436 traffic engineering, 358-359
function, 333 interarea multicasting, 435-436 virtual private network (VPN), 359
Marker field: inter-AS multicast forwarders, 437 forwarding equivalence class (FEC),
BGP messages, 422 inter-AS multicasting, 436-438 359-361,365-368
RTP fixed header, 372 wildcard multicast receiver, 436 label distribution, 367-368
Max Response Time field, Membership Multicasting, 425-441 label format/placement, 363-365
Query message, 433 applications, 426 label stack, 364-365
Maximize Reliability metric, 410 defined, 425 time to live processing,364
Maximize Throughput metric, 411 example configuration, 426-427 label stacking, 363
Maximum packet sizes, and routers, 63 Internet Group Management label switched path (LSP), 360,
Media files, 31 Protocol (IGMP), 430-434 365-368
Medium access control (MAC), 511, defined, 430-431 topology of, 366
514,516-517,539-541 general query, 431 label switched routers (LSRs), 359
access control, 540-541 Group Address field, 433 labels, 365-368
reliable data delivery, 539-540 group membership with IPv6, 434 operation, 359-363
Medium access control (MAC) group-and-source specific packet forwarding, 362
layer, 64 query, 431 route selection, 366-368
Message authentication code, 574 group-specific query, 431 constraint-based routing
Message format, Domain Name System Max Response Time field, 433 algorithm, 367
(DNS),136 Membership Query message, 431 explicit routing, 366
Message formats, Border Gateway Membership Report message, 433 hop-by-hop routing, 366
Protocol (BGP), 421 message format, 431-434 terminology, 360
636 INDEX
Multi-purpose Internet Mail Extension user requirements, 591 Change .Cipher Spec ProtOCOl, 575
(MIME), 95,102-110,137 Simple Network Management connectIOn, 573
application type, 106-107 Protocol (SNMP), 587, Handshake Protocol, 575-577
application/octet-stream subtype, 593-603 protocol stack, 573
106-107 Version 1, 593-597 record protocol, 574-575
application/Postscript subtype, 107 Version 2, 597-602 session, 573
base64 transfer encoding, 108 Version 3, 602-603 security requirements, 548-550
content types, 103-107 systems, 592-593 synunetric encryption, 547, 550-558
Content-Description field, 103 agent, 593 Advanced Encryption Standard
Content-ID field, 103 elements of, 592 (AES), 552-555
Content-Transfer-Encoding field, 103 manager, 593 brute-force attack, 551-552
Content-Type field, 103 Network management application ciphertext,551
defined, 102 (NMA),593 cryptanalysis,551
header fields, 103 Network management entity Data Encryption Standard (DES)
image type, 106 (NME),593 552 '
message type, 105 Network Management Web site, 603 decryption algorithm, 551
message/external-body subtype, 106 Network reachability, 420-421 encryption algorithms, 550,552-555
message/partial subtype, 105 Network security, 547-582 encryption devices, location of
message/rfc822 subtype, 105 active attacks, 549-550 555-556 '
MIME-Version field, 103 denial of service, 550 key distribution, 556-558
multipart type, 103-104 masquerade, 549 key distribution center, 557
multipart/alternative subtype, 105 modification of messages, 550 permanent key, 557
multipart/digest subtype, 105 replay, 549 plaintext, 550
multipart/mixed subtype, 105 active threats, 547 secret key, 550
multipart/parallel subtype, 105 authenticity, 549 security service module (SSM), 557
overview of, 103 availability, 549 session key, 557
quoted-printable transfer encoding, computer security, 548 traffic padding, 558
107-108 confidentiality, 548, 550-558 Transport Layer Security (TLS), 548,
text type, 103 defined, 548 572-573
transfer encodings, 107-110 encryption, 547 . Network service access point
video type, 106 hash functions, 559-565 (NSAP),52
,museum, 130 one-way, 561-563 Network World, 6
Myron Hlynka's QueueingTheciry secure, 563-564 Network-controlled
Page, 193 SHA-1,564-565 establishmentlrelease, 454
information security, 548 Networking configuration, 30-31
integrity, 549 Networking Links web site, 67
N IPv4/IPv6 security, 577-582 Next Header field:
Authentication header, 578, Authentication header, 580
.name,130 580-581 ESP packet, 581
Name resolution, 133, 134-135 Encapsulating Security Payload Hop-by-Hop Options header, 297
Name servers, 128 (ESP), 578,581-582 IPv6,294
National Institute of Standards and IPSec applications, 578 routing header, 299
Technology (NIST), 552 IPSec scope, 578 Next header field, fragment header,
National Science Foundation, 26-27 security association, 578-579 299
Negotiation phase, VTP, 79 message authentication, 559-565 NextHop attribute, Path Attributes
Neighbor acquisition, 420,422 approaches to, 559-563 field, 422-423
Neighbor reachability, 420 code, 560-561 Nodes, 14
Neighbors, 420, 422 using synunetric encryption, 559 Non-HTTTP server, and gateway, 119
.net,130 without message encryption, Non-Real-Time Service, 458, 459-460
Netscape Navigator, 28 559-560 Non-Real-Time Variable Bit Rate
Network access layer, 42 passive attacks, 549 (nrt-VBR),459
Network classes, 284-285 release of message contents, 549 Normal metric, 410
Network layer, OSI, 49 traffic analysis, 549 Normal response mode (NRM), 487
Network management, 587-603 passive threats, 547 Notification message, 422-423
accounting management, 589 public-key encryption, 547,565-572 NSAP,52
user requirements, 589 authenticator, 568 NScount field, 130
configuration and name cipher text, 566 NSFNET, 26-27
management, 590 decryption algorithm, 566 Number of Group Records field,
user requirements, 590 digital signature, 568 Membership Report message,
defined, 587 encryption algorithm, 566 433
fault, defined, 588 general-purpose algorithm, Number of Sources field:
fault management, 588-589 566-567 group record, 433
user requirements, 589 key management, 571-572 Membership Query message, 433
network management application plaintext, 566 NYSERnet, 27
(NMA),593 private key, 566
network management entity public key, 566
(NME),593 public-key certificate, 572 o
performance management, 590-591 RSA algorithm, 568-571
user requirements, 591 Secure Sockets Layer (SSL), 548, Octet tokens, 312
requirements, 588-591 572-577 Ongoing call, 467
security management, 591 architecture, 573 Opcode field, 135
INDEX 637
Open message, 422 Ordered delivery, unreliable network Performance management, 590-591
Open message error, 423 service, 213 user requirements, 591
Open Shortest Path First (OSPF) Ordered service, data transport, 224 Performance metrics, 173-178
protocol, 385, 392, 405-413 .org,130 congestion control, 177
area, 412 Origin attribute, Path Attributes delay, 174-175
Database description packet, 413 field, 422 delay times throughput product,
fields, 412-413 OSI, See Open Systems 175-177
Hello packet, 413 Interconnection (OSI) reference error control, 177
link costs, 410-411 model flow control, 176-177
link-state acknowledgment OSPF, See Open Shortest Path First queuing delays, 178
packet, 413 (OSPF) protocol stop-and-wait protocol, 176
link-state request packet, 413 OSPF working group, 414 throughput, 174
link-state update packet, 413 Performance requirements, 169-173
packet format, 412-413 response time, 169-173
packet types, 413 p throughput, 173
Open Systems Interconnection (OSI) Per-hop behavior, 334-336
reference model, 39,41,46-54 Packet discard, 309 assured forwarding (AF) PHB,
application layer, 49 Packet format, OSPF, 412-413 335-336
data link layer, 49 Packet forwarding, 362 expedited forwarding (EF) PHB,
environment, 50 Packet header, 60-61 334-335
layers, 48 Packet loss, 168 Permanent key, 557
justification of, 49 and inelastic traffic, 308 Permanent Negative Completion reply,
principles used in defining, 47 Packet scheduler, 311 SMTp, 98 '
network layer, 49 Packet switching, 13,15-22,42 Physical layer, 49,514
physical layer, 49 advantages o~ 16, 18 Piggybacking, 478
presentation layer, 49 basic operation, 16-19 PIM, See Protocol Independent
service primitives/parameters, compared to circuit switching, Multicast (PIM)
53-54 18-19 PIMWorking Group, 441
session layer, 49 data transmission, 16 Plaintext, 550,566
standardization within OSI datagram approach, 17, 19,21 Points of presence (PoPs), 533
framework, 51-53 disadvantages o~ 18-19 Poisoned reverse, 404
addressing, 52 packet size, 21 Poisson arrival rate, 201
protocol specification, 52 packets, use of, 16 Policies:
service definition, 52 routing, 21-22 acceptable use, 27
transport layer, 49 congestion, 22 discard, 310
Operation: failure, 21 drop-tail, 327
basic e-mail operation, SMTP, 95-97 switching technique, 19-21 TCP, 232-234
bridges, 524 virtual circuit approach, 19-20 Ports, 42
operation, 524 Packet Type field, RTP packets, 374 Positive acknowledgment, 482
cellular wireless networks, 465-468 Packet types, OSPF, 413 Positive Completion reply, SMTP, 98
operation, 465-468 Packets, 70-72 Positive Intermediate reply, SMTP, 98
differentiated services (DS), 332-334 Pad field, 802.3 frame format, 521 POST request method, 123
domain Name System (DNS), Pad Length field, ESP packet, 581 Power workgroups, 165-166
132-137 Pad1 option, Hop-by-Hop Options high-speed LANs, 512
explicit congestion notification, 266 header, 298 Pragma field, 123
Fast Ethernet, 531 Padding field: Preamble field, 802.3 MAC frames, 520
HDLC,490-494 ESP packet, 581 Presentation layer, OSI, 49
HTTP,l17 IF header, 283 Prip:l.ary station, 487
IGMp, 434 RTP fixed header, 372 Private key, 566
internetworking,273-276 RTP packets, 374 .pro,130
multiprotocollabel switching PadN option, Hop-by-Hop Options Processing delay, 174
(MPLS),359-363 header, 298 Processor sharing (PS), 315-317
packet switching, 16-19 Paging, 467 Projects, 608-610
protocol architecture, 45 Parameter problem message, 289 performance modeling, 609-610
RSVP (Resource ReSerVation Parameters field, ICMP message, 288 reading/report assignments, 610
Protocol), 351-356 Parity check, 480-481 research projects, 610
TCP,58-61 Passive attacks, 549 simulation, 609
TCP/IP,65-67 Passive threats, 547 sockets programming, 608-609
Telnet,78 PATCH request method, 123 Propagation delay, 174
Option data parameter, IP service Path MTU, and security association, Protocol, defined, 40
primitives, 282 579 Protocol architecture, 513-517
Option negotiation commands, Path-vector protocols, 419-425 application layer, 42
Telnet,82 routing, 393 defined, 41
Option subnegotiation commands, Payload Length field: need for, 39-40
Telnet,82 Authentication header, 580 network access layer, 42
Options field: IPv6,294 and networks, 43
Hop-by-Hop Options header, 298 Payload Type field, 454-456 operation o~ 45
IP header, 283 RTP fixed header, 372 peer layers, 40
TCP header, 230 PDUs, See Protocol data units (PDUs) ports, 42
OPTIONS method, SIP, 143 Peer, 40 protocol data unit (PDU), 44-45
OPTIONS request method, 123 Peer layers, 40 service access points (SAPs), 42
638 INDEX
Protocol architecture (cant.) processor sharing (PS), 315-317 RED, See Random early detection
simple, 40-46 weighted fair queuing (WFQ), 319, (RED)
standardized, 46 320-321 Redirect message, 289
three-layer model, 42-45 Quoted-printable transfer encoding, Redirection status codes, 125-126
transport layer, 42 107-108 References, 617-624
Protocol data units (PDUs), 44-45,48, Referrer field, 125
60,61,274 REGISTER method, SIP, 143
Protocol field, IP header, 283 R Release of message contents, 549
Protocol Independent Multicast (PIM), Reliability, and routers, 63
419,438-441 Radix-64 encoding, 109 Reliable Multicast Links, 441
,.' sparse-mode PIM, 439-441
strategy, 438-439
Raj Jain's home page, 267
Random early detection (RED),
Reliable sequencing network service
204-212 '
\ Protocol stack, 573 321-327 addressing, 204-206
Proxy, and security intermediary, 118 algorithm, 323-327 connection establishment and
Proxy server, 138 calculating average queue size, termination, 209-212
Proxy-Authenticate field, 127 324-325 connection termination, 209-212
Proxy-Authorization field, 124 determining packet discard, flow control, 206-209
PS, 315-317 325-327 multiplexing, 206
PSINet,27 defined, 322 Rendezvous point (RP), 439
Public field, 127 design goals, 322-323 Replicated byte format, compressed
Public key, 566 explicit congestion notification mode, 94
Public-key certificate, 572 (ECN),327 REQUEST primitive, 53
Public-key encryption, 547,565-572 motivation, 322 Request-Header' field, 121
authenticator, 568 Range field, 124 Request-Line field, 121
cipher text, 566 Rate-based approach, explicit Res field, fragment header, 299
decryption algorithm, 566 congestion signaling, 187 Reservation protocol, 310
digital signature, 568 Raw sockets, 149 Reserved field:
encryption algorithm, 566 RCPT command, SMTP, 100 Authentication header, 580
general-purpose algorithm, Rdata element, 132 fragment header, 299
566-568 Rdata field length, 131 TCP header, 229
key management, 571-572 Real-Time Service, 458-459 Resource records (RRs), 130-132
plaintex!, 566 Real-Time Transport Protocol (RTP), class element, 131
private key, 566 139,345,368-378 domain name element, 131
public key, 566 mixer, 371 Rdata element, 132
public-key certificate, 572 participant IP addresses, 371 Rdata field length, 131
RSA algorithm, 568-571 protocol, 370-373 time to live element, 131
PUT request method, 123 concepts, 370-372 type element, 131
fixed header, 372-373 types of, 132
protocol architecture, 369-370 Resource ReSerVation Protocol
application-level framing, 369 (RSVP), 327,345,346-357
Q integrated layer processing, data flows, 350-351
369-370 filter spec, 351
QDcount field, 130 RTCP port number, 371 flow descriptor, 351
QQIC (querier's querier interval code) RTP Control Protocol (RTCP), flowspec, 351
field, Membership Query 373-378 goals/characteristics, 348-350
message, 433 application-defined packet, 378 receiver-initiated reservation, 349
QRV (querier's robustness variable) formats, 375 soft state, 350
field, Membership Query Goodbye (BYE) packet, 378 host model, 357
message, 433 identification function, 373 operation, 351-356
Quality of service (QoS), 164-169 quality of service (QoS) and filtering, 353
on the Internet, 167-169 congestion control function, fixed-filter (FF) style, 354-355
support, protocols, 345-378 373 reservation attribute, 353
Query Class field, 137 Receiver Report (RR), 377 reservation styles, 353-356
Query Response field, 135 Sender Report (SR), 376-377 sender selection, 353
Query Type field, 137 session control function, 374 shared-explicit (SE) style, 356
Queuing, 195-201 session size estimation and scaling styles/attributes, 354
models, 196-197 function, 373-374 wildcard-filter (WF) style,
model characteristics, 196-197 Source Description (SDES) 353-354
queue parameters, 196 packet, 377-378 protocol mechanisms, 356-357
results, 197-201 RTP port number, 370 Response Code field, 135
assumptions, 199-200 translator, 371 RESPONSE primitive, 53
basic queuing relationships, Real-Time Variable Bit Rate Response time, 169-173
197-199 (rt-VBR),459 competing requirements, 170
single-server queues, 200-201 Real-time workgroups, and computer processing power, 170
Queuing delays, 178 multicasting, 426 response time ranges, 170
Queuing discipline, 310,314-321 Receiver buffer, 226 system response time, 171
bit-round fair queuing (BRFQ), 315, Receiver, SMTP, 97 user response time, 171
317-318 Record protocol, 574-575 World Wide Web (WWW),
fair queuing (FQ), 314-315 Record Type field, group record, 433 172-173
generalized processor sharing (GPS), Recursion Available field, 135 Response-Header field, 121
318-319 Recursion Desired field, 135 Response-Line field, 121
INDEX 639
Responses, high-level data link control RTP Control Protocol (RTCP), Sequence number:
(HDLC),491 373-378 TCP header, 60
Restart marker, Descriptor field, 94 application-defined packet, 378 transport PDU header, 44
Retransmission after timeout, 482 formats, 375 Sequence number counter, and security
Retransmission strategy, unreliable Goodbye (BYE) packet, 378 association, 579
network service, 213 identification function, 373 Sequence Number field:
Retransmission timer management, quality of service (QoS) and Authentication header, 580
250-254 congestion control function, 373 ESP packet, 581
exponential RTO backoft; 253 Receiver Report (RR), 377 RTP fixed header, 372-373
," Jacobson's algorithm, 250-253 Sender Report (SR), 376-377 TCP header, 229
\ Karn's algorithm, 253-254
RTT variance estimation, 250-253
session control function, 374
session size estimation and scaling
Sequencing, 19
Server error status codes, 125-126
Retry-After field, 127 function, 373-374 Server hierarchy, 133-134
Reuse factor, 463 Source Description (SDES) packet, Service access points (SAPs), 42,52
RFC 822,101-102 377-378 Service categories, ATM, 457-460
RFC publication, 7 RTP port number, 370 Available Bit Rate (ABR)
RFCtypes,9 RTT variance estimation, 250-253 service, 460
RFCs, 605-607 Constant Bit Rate (CBR) service,
RIP, See Routing Information Protocol 458-459
(RIP)
Root name servers, 133-134
s Guaranteed Frame Rate (GFR)
service, 460 ,
Route selection, MPLS, 366-368 S Flag field, Membership Query Non-Real-Time Service, 458,
Router alert option, Hop-by-Hop message, 433 459-460
Options header, 297-299 SAPs, See Service access points (SAPs) Non-Real-Time Variable Bit Rate
Router ID field, OSPF packets, 412 Satellite communication (SATNET), (nrt-VBR),459
Routers, 62, 63, 188 26 Real-Time Service, 458-459
packet discard, 309 SDUs,456 Real-Time Variable Bit Rate
routing algorithm, 309 Secondary station, 487 (rt-VBR),459
Routing, 21-22, 276-277 Secret key, 550 Unspecified Bit Rate (UBR),
congestion, 22 Secure Hash Algorithm (SHA-1), 459-460
failure, 21 564-565,568 Service data units (SDUs), 456
Routing algorithm, ISA, 309 Secure Sockets Layer (SSL), 548, Session Description Protocol (SDP),
Routing approaches, 392-393 572-577 137-139,148
Routing function, 385, 386-390 architecture, 573 Session Initiation Protocol (SIP), 75,
Routing header, IPv6, 292, 299-300 Change Cipher Spec Protocol, 575 115,137-148
Routing information exchange, connection, 573 Call-ID header, 146
423-425 Handshake Protocol, 575-577 client, 137
Routing Information Protocol (RIP), protocol stack, 573 componetns,137-139
385, 399-405 record protocol, 574-575 Contact header, 146
Address Family field, 404 session, 573 Content-Type header, 146
algorithm, 399-400 Security association: CSeq header, 146
Command field, 404 defined, 578 From header, 146
counting to infinity problem, 403 IP destination address, 579 header fields, 145
details, 402-404 parameter, 579 location service, 138
distance-sector route approach, security parameters (SPI), 579 Max-Forwards header, 146
399-402 security protocol identifier, 579 messages, 143-148
distributed Belhnan-Ford algorithm, Security intermediary: r.equests,143-146
400-402 and gateway, 119 responses, 146-148
incremental update, 402 and proxy, 118 operation examples, 140-142
IP Address field, 404 Security Parameters Index field: protocols, 137-139
limitations of, 404 Authentication header, 580 proxy server, 138
Metric field, 404 ESP packet, 581 redirect server, 138
packet format, 404-405 Security parameters (SPI), 579 registrar, 138
poisoned reverse, 404 Security protocol identifier, 579 response code, 143, 147
split horizons rule, 404 Security requirements, 548--549 server, 138
topology changes, 402-403 Security service module (SSM), 557 Session Description Protocol (SDP),
Version field, 404 Segment buffer, 227 137-139,148
Routing philosophies, comparison of, 406 Segment pacing, 247-248 To header, 146
Routing protocol, 311,385 Segments Left field, routing Uniform Resource Identifier (URl),
Routing Type field, routing header, 300 header, 300 139-140
RRs, See Resource records (RRs) Self-clocking behavior, 247 user agent, 138
RSA algorithm, 568-571 Self-similar traffic, 191-192 Via headers, 146
RSA public-key encryption algorithm, Semantics, 73 Session key, 557
568-571 protocols, 40 Session, Secure Sockets Layer
RSvp, See Resourse ReSerVation Semipermanent establishment/release, (SSL),573
Protocol 454 Settlements, 27
RSVP Project, 379 Semipermanent virtual channels, 453 Shaper element, traffic conditioning
RSVP Working Group, 379 Send buffer, 226 function, 333
RTCP port number, 371 Sender, SMTP, 96-97 SHA-1, See Secure Hash Algorithm
RTF, See Real-TIme Transport Sequence counter overflow, and (SHA-1)
Protocol (RTP) security association, 579 Shielded twisted pair (STP), 529
640 INDEX
INDEX 641
TCP/IP Resources List Web site, 235 congestion control, 246-263 Transport Layer Security (TLS)
Technical specification (TS), 9 TCP flow and, 247-250 protocol, 139,548,572-573
Teleconferencing, and multicasting, 426 congestion control measures, Transport PDU, 44-45
Telnet, 75, 77-86, 83, 148,203,305,307 implementation of, 249 header, 44
Abort Output (AO) command, 83 connection establishment, 231 Transport protocol timers, 214
assigned options, 84 connection maintenance, 224 Triple DES (3DES), 552
commands, 82 connection management, 222-223 Trivial File Transfer Protocol (TFTP),
Data Mark (DM) command, 83 connection termination, 224, 231 40,70-73
design of, 78 data transfer, 231 defined, 70
Interrrupt Process (IP) command, 83 data transport, 223-224 errors/delays, 71,73
longevity of, 86 error reporting, 224 packets, 70-72
network virtual terminal (NVT), explicit congestion notification semantics, 73
78-80 (ECN),263-266 syntax, 73
operational environment, 78 basic operation, 266 timing, 73
option negotiation, 85-86 IP header, 264--265 transfer overview, 72-73
Option negotiation commands, 82 TCP header, 265 Truncated field, 135
Option subnegotiation TCP initialization, 265 Two-way handshake, 217-218
commands, 82 flow control performance, 241 Type field:
options, 83-85 flow control/error control, 240-246 BGP messages, 422
remote terminal access, 78-80 adaptive retransmission timer, ICMP message, 288
server Telnet module, 80 243-246 Membership Query message, 431
synch mechanism, 83 effect of window size on Membership Report message, 433
transfer protocol, 80-82 performance, 240-242 OSPF packets, 412
user Telnet module, 80 exponential average, 243-246 Type of service indicators parameter,
virtual terminal protocol (VTP), 79 retransmission strategy, 242-243 IP service primitives, 282
Telnet.org, 110 simple average, 243 T-1 connection, 29
10 Gigabit Ethernet Alliance, 543 header format, 228-231
10-Gbps Ethernet, 533-534 fields, 228-230
Terminal access, 77-86 push function, 230 u
TFT value, Content-type field, 106 urgent function, 230
TFTP, See Trivial File Transfer Protocol implementation policy options, UDp, See User Datagram Protocol
(TFTP) 232-234 (UDP)
3G Americas, 469 accept policy, 232-233 UDP header, 57
Three-layer model, 42-45 acknowledge policy, 233 Uncompressed data format,
Three-way handshake, 218-220 deliver policy, 232 compressed mode, 94
examples of, 220 retransmit policy, 233 Unicast, 297
Throughput, 168, 173, 174 send policy, 232 Unicast address, 281
and inelastic traffic, 308 implicit congestion notification, 264 Uniform Resource Identifier (URI),
Time exceeded message, 289 mechanisms, 231 139-140 .
Time to live element, 131 multiplexing,221-222 Unless field, 125
Time to Live field, IP header, 283 operation of, 58-61 UNLINK request metbod, 124
Time to live parameter, IP service receiver buffer, 226 Unreliable network service, 212-221
primitives, 282 retransmission timer management, connection determination, 220-221
Timely service, data transport, 224 250-254 connection establishment, 216-220
Timestamp field, RTP fixed header, 373 exponential RTO back off, 253 duplicate detection, 214--216
Timestamp message, 289-290 Jacobson's algorithm, 250-253 failure recovery, 221
Timestamp reply message, 289-90 Karn's algoritbm, 253-254 flow control, 216
Timing: RTT variance estimation, 250-253 . ordered delivery, 212-213
protocols, 40 segment buffer, 227 retransmission strategy, 213-214
TFTP, 73 segment pacing, 247-248 Unshielded twisted pair (UTP), 529
Title field, 127 self-clocking behavior, 247 Unspecified Bit Rate (UBR), 459-460
Token bucket scheme, 312 send buffer, 226 Update message, 422
Top-level Internet domains, 130 service categories, 221-224 Update message error, 423
Total Lengtb field, IP header, 283 service parameters, 227 Upgrade field, 123
Traffic analysis, 549 service primitives, 224--226 Urgent data signaling, 224
Traffic channels, 466 service request primitives, 225 Urgent Pointer field, TCP header, 230
Traffic conditioning function, 333 service response primitives, 226 URI,139-140
Traffic control, 239-266 services, 221-226 URL-Header field, 128
Traffic management, 187-188 summary of, 222 .us,130
fairness, 187 special capabilities, 224 USENET, 6,34--36,345
quality of service, 187-188 traffic control, 239-266 User data transfer, 450-451
reservations, 188 UDP, and, 56-57 Address field, 451
Traffic padding, 558 window management, 254--263 Flag and Frame Check Sequence
Traffic specification (TSpec), 311 dynamic window sizing on (FCS) fields, 451
Transfer encodings, MIME, 107-110 congestion, 255-258 User Datagram Protocol (UDP),
Transfer-Encoding field, 127-128 fast recovery, 259-262 56-57,61,167,203,234--235
Transient Negative Completion reply, fast retransmit, 258-260 header, 235
SMTP,98 limited transmit, 261-263 User modules (UMs), 535
Transmission Control Protocol (TCP), slow start, 254--256,257,258 User-Agent field, 125
55, 203, 226-234 Transmission delay, 174 User-Based Security (USM)
basic operations, 226-228 Transport layer, 42,55 model, 602
642 INDEX
User-network interface (UNI), 456 Web/database system, compared to increasing capacity, 463-464
UTP,529 traditional database approach, microcells, 464
UUNET,27 32-33 mobile telecommunications
Weighted fair queuing (WFQ), 319, switching office (MTSO), 465
320-321 mobile unit initialization, 466-467
v WFQ, See Weighted fair queuing
(WFQ)
mobile-originated call, 467
ongoing call, 467
Vendors, 6 Wholesalers, and ISPs, 29 operation, 465-468
Verison field, IP header, 283 Wide area networks (WANs), 15, paging, 467
Version field: 23-24,31,61,447-468 traffic channels, 466
IPv6,293 asynchronous transfer mode (ATM), corporate WAN needs, 166
OSPF packets, 412 451-460 frame relay, 447-451
RIP packet, 404 cell loss priority (CLP), 456 background, 448-449
RTP fixed header, 372 cells, 454-457 control plane, 449
RTP packets, 374 control signaling, 453-454 protocol architecture, 449-450
Video type, MIME, 106 generic flow control, 456-457 user plane, 449-450
View-Based Access Control Model Generic Flow Control (GFC) user data transfer, 450-451
(VACM),602 field,454 Address field, 451
Vine, Barbara, 163,273 Header Error Control (HEC) Flag and Frame Check Sequence
Virtual Channel Identifier (VCI) field,456 (FCS) fields, 451
field,454 logical connections in, 452 Wi-FiAlliance, 543
Virtual channels, 451-454 meta-signaling channel, 453 Window field, TCP header, 229
characteristics of, 452-453 Payload Type (PT) field, 454-456 Window management, 254-263
semipermanent, 453 semipermanent virtual dynamic window sizing on
Virtual channels/virtual paths, 451-454 channels, 453 congestion, 255-258
Virtual circuit, 19-20 service categories, 457-460 fast recovery, 259-262
Virtual Path Identifier (VPI) field, 454 Virtual Channel Identifier (VCI) fast retransmit, 258-260
Virtual paths, 451-454 field,454 limited transmit, 261-263
advantages of, 452 virtual channels/virtual paths, slow start, 254-258
characteristics of, 452-453 451-454 Wireless Ethernet Compatibility
customer-controlled Virtual Path Identifier (VPI) Alliance (WECA), 542
establishment/release, 454 field,454 Wireless LAN Alliance, 543
methods, 454 cellular wireless networks, 460-468 Wireless LANs, 534-542
network-controlled adding new channels, 463 applications, 535-536
establishment/release, 454 base station, 461,465 IEEE 802.11 architecture, 537-538
semipermanent call accepted, 467 IEEE 802.11 medium access control,
establishment/release, 454 call blocking, 467 539-541
Virtual private network (VPN), 36 call drop, 467 IEEE 802.11 physical layer, 541-542
Voice over IP (VoIP), 137 call termination, 467 IEEE 802.11 services, 538-539
calls to/from fixed and remote LAN requirements, 536-537
mobile subscriber, 468 Wireless networks, 24
w cell sectoring, 464
cell splitting, 463-464
World Wide Web (WWW),27-29,116
WRAPPED request method, 124
WANs, See Wide area networks cellular network oranization, WWW, See World Wide Web (WWW)
(WANs) 461-465 WWW Consortium, 157
Web content, Intranet Web, 32 cellular radio, 461 WWW-Authenticate field, 127
Web resources, 5-6 control channels, 466
Web/database applications, Intranet defined, 460
Web,32-34 frequency borrowing, 463 z
Web/database connectivity, 33 frequency reuse, 462-463
Intranet Web, 33 handoff, 467 Zone, 133